Hacking Team data leak 'reveals links to Sudan and Russia'

Cyber criminals hack spy tool vendor to 'show it sold products to UN-embargoed Sudan'

A surveillance and exploit tool vendor has been hacked, with documents revealing commercial links to countries it has denied doing business with.

The Italian company, Hacking Team, specialises in "offensive security", providing software to gain access to systems and collect data undetected.

However, its network was compromised at some point on Sunday evening by unknown cyber criminals, who hijacked its Twitter page to rename it 'Hacked Team', and posted a link to a torrent containing 400GB of stolen information.

The leaked files appear to show links between Hacking Team and countries such as Sudan and the United Arab Emirates.

Both governments have been criticised by Human Rights Watch in the past for oppressive regimes, and Sudan in particular is currently under a UN trade embargo.

A report by Citizen Lab in 2014 suggested that Hacking Team's Remote Control software was in use in the Sudan despite the embargo banning this, and a UN investigation has been ongoing for around a year.

Hacking Team has previously stated that it "has no business relations or any agreements that would allow the Sudan or any entity in its territory to use the software", but the leaked files suggest this is not true.

An invoice dated 5 September 2012 references a contract signed on 29 June that year between Sudan and Hacking Team.

The contract, apparently for the vendor's Remote Control software, was worth 960,000.

An internal maintenance document listing customers' subscription statuses also lists Sudan as "not officially supported"  a category it shares with Russia.

Speaking with IBTimes in 2013, Eric Rabe, Hacking Team's head of communications, was keen to emphasise the legality of the company's dealings.

"The process under which Hacking Team sells its products is designed to make sure they are not abused and they are used in accordance with the applicable laws and international standards such as black lists that restrict where some products like this can be sold," he told the site.

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

Monero miners target cloud-native development environments
cryptocurrencies

Monero miners target cloud-native development environments

5 Mar 2021
Ten ways to protect your company from the next big data breach
data breaches

Ten ways to protect your company from the next big data breach

5 Mar 2021
IT security awareness and training firm KnowBe4 acquires MediaPRO
Acquisition

IT security awareness and training firm KnowBe4 acquires MediaPRO

3 Mar 2021
High-risk email security threats increased by 32% last year
phishing

High-risk email security threats increased by 32% last year

3 Mar 2021

Most Popular

Star Alliance passenger data stolen in SITA data breach
data breaches

Star Alliance passenger data stolen in SITA data breach

5 Mar 2021
I went shopping at Amazon’s till-less supermarket so that you don’t have to
automation

I went shopping at Amazon’s till-less supermarket so that you don’t have to

5 Mar 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021